ID

VAR-202302-0119


CVE

CVE-2023-20073


TITLE

Unrestricted upload vulnerability of dangerous file types in multiple Cisco Systems products

Trust: 0.8

sources: JVNDB: JVNDB-2023-006872

DESCRIPTION

A vulnerability in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device. This vulnerability is due to insufficient authorization enforcement mechanisms in the context of file uploads. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to upload arbitrary files to the affected device. RV340 firmware, RV340W firmware, RV345 Multiple Cisco Systems products, including firmware, contain vulnerabilities that allow unrestricted upload of dangerous types of files.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The RV340, RV340W, RV345, and RV345P are Cisco's small business VPN routers. There are binary vulnerabilities in many Cisco products, and attackers can use this vulnerability to upload files for overwriting. There are no workarounds that address this vulnerability. This advisory is available at the following link:sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-afu-EXxwA65V

Trust: 2.25

sources: NVD: CVE-2023-20073 // JVNDB: JVNDB-2023-006872 // CNVD: CNVD-2023-09623 // VULMON: CVE-2023-20073

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-09623

AFFECTED PRODUCTS

vendor:ciscomodel:rv340scope:lteversion:1.0.03.29

Trust: 1.0

vendor:ciscomodel:rv340wscope:lteversion:1.0.03.29

Trust: 1.0

vendor:ciscomodel:rv345scope:lteversion:1.0.03.29

Trust: 1.0

vendor:ciscomodel:rv345pscope:lteversion:1.0.03.29

Trust: 1.0

vendor:シスコシステムズmodel:rv340wscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:rv340scope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:rv345scope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:rv345pscope: - version: -

Trust: 0.8

vendor:ciscomodel:rv340scope:eqversion:1.0.03.29

Trust: 0.6

vendor:ciscomodel:rv340wscope:eqversion:1.0.03.29

Trust: 0.6

vendor:ciscomodel:rv345scope:eqversion:1.0.03.29

Trust: 0.6

vendor:ciscomodel:rv345pscope:eqversion:1.0.03.29

Trust: 0.6

sources: CNVD: CNVD-2023-09623 // JVNDB: JVNDB-2023-006872 // NVD: CVE-2023-20073

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-20073
value: CRITICAL

Trust: 1.0

ykramarz@cisco.com: CVE-2023-20073
value: MEDIUM

Trust: 1.0

NVD: CVE-2023-20073
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2023-09623
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202302-139
value: CRITICAL

Trust: 0.6

CNVD: CNVD-2023-09623
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-20073
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2023-20073
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2023-20073
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2023-09623 // JVNDB: JVNDB-2023-006872 // CNNVD: CNNVD-202302-139 // NVD: CVE-2023-20073 // NVD: CVE-2023-20073

PROBLEMTYPE DATA

problemtype:CWE-434

Trust: 1.0

problemtype:Unlimited uploads of dangerous types of files (CWE-434) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-006872 // NVD: CVE-2023-20073

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202302-139

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202302-139

PATCH

title:cisco-sa-sb-rv-afu-EXxwA65Vurl:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-afu-EXxwA65V

Trust: 0.8

title:Patch for Multiple Cisco products have binary vulnerabilities (CNVD-2023-09623)url:https://www.cnvd.org.cn/patchInfo/show/409441

Trust: 0.6

title:Cisco Small Business RV340 Fixes for code issue vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=232932

Trust: 0.6

title:Cisco: Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Arbitrary File Upload Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-sb-rv-afu-EXxwA65V

Trust: 0.1

sources: CNVD: CNVD-2023-09623 // VULMON: CVE-2023-20073 // JVNDB: JVNDB-2023-006872 // CNNVD: CNNVD-202302-139

EXTERNAL IDS

db:NVDid:CVE-2023-20073

Trust: 3.9

db:JVNDBid:JVNDB-2023-006872

Trust: 0.8

db:CNVDid:CNVD-2023-09623

Trust: 0.6

db:AUSCERTid:ESB-2023.0606

Trust: 0.6

db:CNNVDid:CNNVD-202302-139

Trust: 0.6

db:VULMONid:CVE-2023-20073

Trust: 0.1

sources: CNVD: CNVD-2023-09623 // VULMON: CVE-2023-20073 // JVNDB: JVNDB-2023-006872 // CNNVD: CNNVD-202302-139 // NVD: CVE-2023-20073

REFERENCES

url:https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sb-rv-afu-exxwa65v

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2023-20073

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2023-20073/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0606

Trust: 0.6

sources: VULMON: CVE-2023-20073 // JVNDB: JVNDB-2023-006872 // CNNVD: CNNVD-202302-139 // NVD: CVE-2023-20073

SOURCES

db:CNVDid:CNVD-2023-09623
db:VULMONid:CVE-2023-20073
db:JVNDBid:JVNDB-2023-006872
db:CNNVDid:CNNVD-202302-139
db:NVDid:CVE-2023-20073

LAST UPDATE DATE

2024-08-14T15:37:09.825000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2023-09623date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2023-006872date:2023-11-16T07:42:00
db:CNNVDid:CNNVD-202302-139date:2023-04-12T00:00:00
db:NVDid:CVE-2023-20073date:2023-11-07T04:05:56.720

SOURCES RELEASE DATE

db:CNVDid:CNVD-2023-09623date:2023-02-23T00:00:00
db:JVNDBid:JVNDB-2023-006872date:2023-11-16T00:00:00
db:CNNVDid:CNNVD-202302-139date:2023-02-02T00:00:00
db:NVDid:CVE-2023-20073date:2023-04-05T16:15:07.720